38
Mobile Identity Management: An Enacted View George Roussos, Don Peterson, and Uma Patel Abstract. Growth of mobile business requires the ability to provide context aware services when and where needed, the development of trust relationships between trading partners and the ever-expanding capability for reconfiguration of value chains. These issues become even more prominent by the emergence of converged architectures for next generation public networks, a result of integration of the Internet, traditional telephony networks and consumer electronics, which brings mobile business to the forefront. In this context, mobile identity management can play a central role to address usability and trust issues in mobile business. For this reason, it is being established as a core service for next generation mobile telecommunications infrastructures. Mobile identity management is used to identify, acquire, access and pay for services that follow the user from device to device, location to location and context to context and thus, becomes the network component that holds together novel services on novel networks using innovative business models. In contrast to previous generation mobile business infrastructures, this represents a pivotal shift in focus from identification to identity. In this paper we advocate that this shift calls for the enacted view of technology since the level of involvement of human qualities is unprecedented when discussing identity. We introduce a view of identity in mobile business based on three principles and we find that this approach is useful in explaining some recent research findings in ubiquitous retailing. We expect that widening the discipline boundaries for future research on identity in 1

Mobile Identity Management

Embed Size (px)

DESCRIPTION

Mobile Identity Management Overview

Citation preview

Mobile Identity Management: An Enacted View

George Roussos, Don Peterson, and Uma Patel

Abstract. Growth of mobile business requires the ability to provide context aware

services when and where needed, the development of trust relationships between trading

partners and the ever-expanding capability for reconfiguration of value chains. These

issues become even more prominent by the emergence of converged architectures for

next generation public networks, a result of integration of the Internet, traditional

telephony networks and consumer electronics, which brings mobile business to the

forefront. In this context, mobile identity management can play a central role to address

usability and trust issues in mobile business. For this reason, it is being established as a

core service for next generation mobile telecommunications infrastructures. Mobile

identity management is used to identify, acquire, access and pay for services that follow

the user from device to device, location to location and context to context and thus,

becomes the network component that holds together novel services on novel networks

using innovative business models. In contrast to previous generation mobile business

infrastructures, this represents a pivotal shift in focus from identification to identity. In

this paper we advocate that this shift calls for the enacted view of technology since the

level of involvement of human qualities is unprecedented when discussing identity. We

introduce a view of identity in mobile business based on three principles and we find that

this approach is useful in explaining some recent research findings in ubiquitous retailing.

We expect that widening the discipline boundaries for future research on identity in

1

mobile business will be essential for the development of effective mobile service

provision systems.

Keywords: mobile identity management, pervasive computing, ubiquitous computing,

next generation mobile communication systems, service provision.

1. Introduction

Mobile business is perceived as the main driving force for the next phase of electronic

commerce growth primarily due to the rapid adoption of second-generation mobile

telecommunication systems that have created a market opportunity of several hundred

million consumers worldwide. The growth of mobile commerce is expected to accelerate

with the emergence of converged Internet-telephony networks and hybrid computing-

communications devices, either with the introduction of third generation mobile networks

or through the operation of hybrid fourth generation networks. Crucial success factors for

the provision of mobile services are the issues of usability and trust: the small form factor

of mobile devices implies that both application navigation and content delivery should be

adapted on the fly to reflect the particular needs of the particular user; and acceptable

mobile information service provision systems need to operate within a trustworthy

environment for the user. In this context, trust is primarily dependant on the perception

that identification credentials, financial transactions and personal profile are kept secure

and private. Furthermore, the emergence of a converged architecture for next generation

public networks, resulting from the integration of Internet, traditional telecommunications

networks and consumer electronics, brings issues related to mobility to the forefront.

2

Mobile identity management is viewed as an approach that can address both usability and

trust concerns in mobile business and for this reason it is being established as a core

service for next generation mobile telecommunications infrastructure. It is used to

identify, acquire, access and pay for services that follow the user from device to device,

location to location and context to context and thus, becomes the network component that

holds together novel services on novel networks using innovative business models. In

contrast to previous generation mobile business infrastructures, there is a pivotal shift of

focus from identification to identity. Indeed, this change in focus plays a central role in

the arguments developed in this paper: while identification is a static concept, the concept

of identity is altogether more dynamic because it is situated, negotiated and underpinned

by trust.

Issues of identity, being fundamentally personal and cultural become integral to everyday

life and thus require appropriate treatment. To this end, we propose that a suitable

perspective on mobile identity management is provided by the so-called enacted view,

that is a stance that considers mobile business as an evolving party to human activities.

Indeed, the enacted view approaches mobile business as an open-ended socio-technical

production: a mass of particular actions taken as individuals and groups make their own

uses of technologies. The result may be dynamic, unpredictable and strongly mediated by

the idiosyncrasies, needs, and preferences of individuals and groups. Following the

enacted view we attempt to establish a three-principle approach for the study of mobile

identity management. We find that the three principles are a useful conceptual framework

to explain findings from our research on ubiquitous retailing.

3

The paper is structured as follows: In section two we discuss the elements and the

properties of mobile identity management systems. In section three we investigate the

role of mobile identity management systems as well as that of the identity service

provider for current mobile business markets. At the end of this section we also present

briefly a selection of the first generation mobile identity management systems available

today. In section four, we introduce the architecture of next generation mobile

communications systems and the novel types of federated business services that can be

developed on them. In particular, we focus on the development of the so-called

ubiquitous retail and report on recent results that provide some evidence for the relevance

of mobile identity management in this context. Finally, we introduce a conceptual

framework based on three principles following the enacted view. We expect this

framework to be useful for the study of mobile identity management systems and indeed

we find that it can provide a consistent and concrete foundation to explain our findings

from ubiquitous retail.

2. An Overview of Mobile Identity Management

Identity is an essential characteristic of the experience of being human. It encompasses

elements that make each human being unique but also all the characteristics that signify

membership to a particular group or culture and establish status within that group.

However, Internet mediated communication filters out a significant proportion of cues

that can reveal identity in the physical world thus obscuring recognition of individuals or

of characteristics pertinent to particular groups [42, 56]. Today, the effect of poor identity

4

visibility in Internet mediated communications is becoming critical primarily due to the

proliferation of electronic commerce over the Internet and via mobile

telecommunications networks. The split between our perception of human identity and

its electronic representation will only increase with the introduction of ubiquitous

technologies and systems.

Digital identification systems have been used for decades [8] to record and preserve the

electronic representation of personal information of an individual including name,

address, phone numbers and demographics. The emergence of the Internet as a common

communications infrastructure requires that digital identification becomes digital identity,

the basis of the digital-self. Identity systems materialise as the keeper of not only personal

electronic information (credit card numbers, biometrics, personal health records, personal

preferences) but also the channel through which individuals communicate, interact,

transact, share reputations and create trust relationships with people, businesses, and

devices. The operations performed to support the lifecycle of the digital identity are

referred to as identity management. The distinction between identification and identity is

pivotal to this paper. Identification is a restricted concept that refers to some combination

of facets by which an entity is recognised. Digital identification is a set of data that

represent the personal information of an individual or an organisation. Misconceptions

are caused by the fact that frequently digital identification is erroneously referred to as

digital identity. Whereas identification is a static concept, the concept of identity or of the

digital self is altogether more dynamic because it is arguably situated, negotiated and

underpinned by trust. It is a core premise of this paper that whereas the current dominant

5

design paradigm is concerned with solutions to management of digital identification,

consumers perceive and behave as if digital identification is a synonym of digital identity.

This line of reasoning is supported by findings from studies on consumer confidence in

electronic commerce (cf. references later in this section), research findings on consumer

perceptions of ubiquitous commerce (cf. section four) and arguments which explain

consumer mistrust in terms of the three principles we discuss in section five.

Mobile (digital) identity is an extension of the concept of digital identity that illuminates

the importance of mobility. Indeed, identity is mobile in many respects. The first mode of

mobility is from device to device. This means mobile identity can be used to certify the

authority of a particular individual to gain access to information and resources while

using different mobile devices. A good example is when an employee gains access to her

corporate email account from a workstation, a mobile telephone and a personal digital

assistant. The second mode of mobility is from (physical) location-to-location that is,

where an individual moves between different locations but still requires access to systems

and information according to her role and credentials. For example, the case where a

salesperson moving from city to city to visit clients requires access to personal sales

performance data from the corporate portal. An issue closely related to location mobility

is that of coordination of authority domains, since a person moving from location-to-

location is also usually moving between areas controlled by different organisations.

When employees access information systems from their desk both the access medium and

the information storage are physically located within a single authority domain regulated

by their employer whereas, when they access information via one of their trading

6

partner’s extranet, they cross organisational boundaries and the trust relationship between

the two organisations must be negotiated as well.

The third mode of mobility is from context-to-context that is where a person receives

services based on different societal roles: as a professional, as a sports fan, as a parent

and so on. For example, by adapting to context –which includes time, date, location and

so forth— individuals might have widely different entertainment needs depending on

whether they act, for example, in their professional capacity or as a parent. Of course, the

three modes of mobility are not isolated but more often than not, different modes are

concurrently modified and thus create much more complex situations than what implied

from a single mode in isolation. Finally, the elements (described in detail below) that

make up the mobile identity may not be stored at the same location but they may be

distributed between different locations, authority domains and devices. For example,

personal information may be held at a home service gateway server (most probably a set-

top box), payment information may be held at an associated bank, music preferences may

be held at an entertainment service provider and gaming results may be held at an on-line

game service provider.

Mobile identity has three components: identification, payment and personalisation.

Identification is the association of a set of tangible and structured credentials with a

particular person that is valid within a particular formal system and can be used to

explicitly distinguish the particular individual from any other in the same system.

Examples of identification methods are national identity cards in Germany, social

7

security numbers in the United States and credit cards or driver’s licenses in the United

Kingdom. In contrast to identity, identification is a concrete concept which is well

understood and with a long social history and specific significance within a particular

system (for a historical review of identification see [8]). Identification is also a well-

understood concept from the point of view of information systems --as a matter of fact

identification methods and management have been a consistent strand in information

systems research [57]. Issues affecting identification in information systems are

authentication, authorisation and access control mechanisms, directories, electronic

payment, trust management and public key infrastructures, all mechanisms representing

incremental developments in managing identification information and controlling access

to resources as well as managing relationships between persons and groups across

administrative domains.

Although identification methods are well developed and established they are not without

problems. A recent report by the US Federal Trade Commission [51] states that identity

theft is the fastest growing crime in America with over 900,000 victims each year.

Identity theft is the replication of identification credentials and the use of them to either

obtain access to individual resources (for example computer files, bank accounts, credit

rating) or to establish new accounts or credit using the victim’s credential and without

their consent. Although the emotional cost at the individual level is significant, arguably

the financial cost is also important [28]. In the UK alone, fraud related to identity theft

has been estimated to 293 million pounds sterling in the year 2000 and is expected to rise

to 800 million by 2005 [26].

8

Indeed, identification is closely related to payment in the sense that financial transactions

are between two named and identifiable parties and hence they are based on the exchange

of personal data. What sets payment information apart from other types of identification

information is the fact that the two parties involved in a financial transaction are almost

always bound in a contractual agreement and thus, the appropriate commerce law also

regulates use of identification data. In mobile business, provision of payment services as

part of mobile identity management can form the basis for the development of a trust

relationship with the consumer. This relationship can play a significant role in the

development of mobile commerce since the primary benefits offered by mobile

transactions, that is convenience, lower prices, and lower search costs, are offset by costs

associated with risk taking and loss of privacy; in particular, the economic risk arising

from potential monetary loss could be significant [44]. In fact, widespread consumer

concerns about risk have been repeatedly identified as one of the main reasons for the

slower than expected growth of electronic and mobile commerce [4, 17, 20, 50]. It is

characteristic that recent studies have estimated that more than 94 per cent of consumers

have refused to provide data to a web site and more than 40 per cent have provided fake

data [33].

In the context of mobile business, personalised service provision is even more important

due to the inherent limitations of mobile access devices, which make personalisation a

fundamental component of mobile user interfaces. Indeed, context aware service delivery

[25] has been recognised as a fundamental requirement for mobile users due to the

9

continuous change of the point where their mobile device attaches to the network; the

small screen size of the mobile unit and its limited resources (including computational

power and battery); and the limited bandwidth offered by wireless communications.

Context awareness is required for both the application functionality and the content

delivered. A significant element of context is identity and thus personal profile [25].

Furthermore, versioning of information goods to maximise revenue via differential

pricing is a well-established practice [52] and taken to the limit the concept implies

personalised content delivery, that is, an adapted version of the good that facilitates the

individual needs, preferences and habits of the particular consumer. Several existing

applications exhibit adaptable behaviour based on identity information of their user, for

example RoboForm and the collection of applications under the Freedom network.

Experimental systems like the Vallet [10] go a long way towards developing an

intelligent context aware agent that independently caters to the needs of its owner and

there are significant resources invested to research efforts towards the development of the

so-called “enduring personalized cognitive assistant”. The development of these

applications is also justified by the perception of mobile consumers that the overhead

required for the management of multiple accounts with multiple trading partners is

significant and the repetitive effort of form filling as part of security and privacy

mechanisms has been proven to be the source of error as well as regular security

compromises.

Hence, part of mobile identity is also the personal profile. What data exactly constitutes a

personal profile differs significantly depending on the particular profiling method and

10

technology used. Explicit personalisation occurs when the individual specifically chooses

from a number of options on a list, such as selecting colour schemes, welcome messages

or areas of interest for news messages (for example favourite sport or team). Implicit

personalisation results from the construction (and continuous update) of a personal profile

based on historical usage data. Implicit personalisation methods have three advantages

over explicit methods: they do not require a pre-configuration step, they evolve over time

and they capture unconscious as well as conscious actions and responses. On the

downside, they are significantly more complex and thus computationally expensive but

also require a longer period of training before they can produce reliable results. Examples

of implicit systems include rule-based systems as well as content based and collaborative

filtering systems. No matter which method is used, all personalisation methods require

that the users accept to give up some of their personal data to the service provider. This

fact raises privacy issues and increasingly consumers are concerned not only about the

use of their personal data but also about their ability to be involved in the uses of the

information they supply either through explicit permission or economic incentives [7].

Finally, it is worth noting that mobile identity has different interaction modes. The first

and simplest is peer-to-peer where identification and credential exchange is performed

without the mediation of a certification authority, in a distributed decentralised manner.

Trust is developed at a local, ad-hoc interaction level. The second type of interaction is

the nomadic mode –existing within a single administrative domain-- where there is a

single authority that certifies identity credentials. For the support of nomadic interactions

some infrastructure is required: identification and credential exchange protocols,

11

mechanisms for group member identification, membership control and access to common

resources. The third mode of interaction is inter-domain nomadic interactions that is,

interactions between entities across authority domains or even at a global scale. For this

operational mode employed protocols and mechanisms should conform to well-known

open standards and management of relationships between authority domains must be

catered for.

3. Identity and Mobile Business

In this section we identify the interactions between different types of mobile business [27,

40] and mobile identity management, including business-to-consumer, consumer-to-

consumer and enterprise-to-employee. Then we proceed to discuss the role of the mobile

identity service provider for mobile business. Finally, we briefly discuss technology

alternatives in first generation identity management systems.

Business-to-Consumer. Mobile business is perceived as the main driving force for the

next phase of electronic commerce growth [53, 54] primarily due to the rapid adoption of

second generation mobile telecommunication systems. Indeed, this development has

created a market of several million consumers worldwide. The growth of mobile

commerce is expected to continue with the emergence of converged Internet and

telephony networks either with the introduction of third generation mobile networks or as

hybrid fourth generation networks (cf. section four for more details on fourth generation

systems). Indeed, demand for data driven applications and mobility are the main growth

and convergence factors. As a measure of the expected impact of the shift towards a

12

mobile Internet eMarketer a market research firm, estimates that 57 per cent of Internet

users will be mobile by 2007. On the other hand, it is less clear what proportion of

mobile users will actually be mobile consumers. Indeed, while initial estimates (Gartner

1999) talked about 200 billion US dollars of mobile business revenue by 2004 current

revised estimates predict revenues between 1 and 20 billion US dollars by the same date.

According to Forrester Research a market research firm, although mobile users allude to

different aspects to justify their reluctance to adopt mobile commerce their main concerns

are security (for 52 per cent of the study participants) and unsatisfactory user experience

(for 35 per cent of the study participants). Also, the Gartner Group a market research

firm, state that for mobile telephone users usability and trust are the critical factors for the

widespread adoption of mobile business. According to the same study, if mobile business

does not take off it will be primarily due to the high risk level perceived by mobile

consumers as well as to non-standardisation of mobile business systems which will

restrict interoperability and thus mobility.

Mobile identity management addresses both of the two main challenges identified above

that is, usability via context awareness and trust based on the perception of secure

operation and protection of privacy. Indeed, mobility creates new opportunities but at the

same time is also a limiting factor: to best serve their purpose, mobile devices have to be

small with a correspondingly small display. A consequence of the small form factor is

lower computational capability. For this reason it becomes essential that services offered

on mobile devices require little or no navigational effort which further implies that the

service itself should be adaptive to the needs of the particular person using the service as

13

well as responsive to the situation that person is in. In fact, in order to be successful,

mobile Internet services will have to be highly personalised and context aware or else

they will have to be adaptable to identity information. Although identity information has

an important role to play in supporting adaptable and personalised service provision,

deployments of mobile identity management systems today are primarily a component of

branded application service provision solutions. This approach appears to have certain

advantages as the main interaction mode in mobile commerce since it facilitates the

transparent operation of virtualised value chains [16, 23, 29]. To the user at the receiving

end of a mobile service the moving boundary between business partners is imperceptible

and irrelevant at large. Indeed, the consumer develops and maintains a trust relationship

with a single trading partner rather than having to renegotiate the relationships whenever

the virtualised value chain is reconfigured. Thus, any risk for consumers as well as any

trust management issue is mitigated to the provider of the service. Despite advances in

security standards and technologies there is still significant divergence between

consumers perception of security and that actually available in deployed digital payment

systems [36]. By having a single point of interaction consumers are also confident that

they can maintain some level of control over their personal details and payment

transactions irrespective of the service provider of the service [7].

Consumer-to-Consumer. Another area of mobile business that is affected by identity

management issues is that of consumer-to-consumer (C2C) commerce which is one of the

first e-commerce activities that was extended to mobile. Indeed, there are certain

advantages in timely notification of specific events in C2C marketplaces, particularly

14

with regard to the availability of new items and the monitoring of specific auctions in

which the consumer is interested. A recent study in C2C commerce [43] identified price

and trustworthiness as the two main factors affecting online seller choice. Trust between

seller and buyer in this situation is seen to depend on the reputation of the seller

(constructed via recorded commentary by other consumers and the available rating of

satisfaction levels of previous transactions) as well as the quality and number of previous

interactions between the particular C2C pair. In this context strong identity credentials

can be seen to directly translate to a price premium.

Enterprise-to-Employee. Mobile identity management also plays a significant role

within the boundary of a single organisation. Indeed, organisations require their

employees to be increasingly mobile either by working in remote locations or

teleworking or as an extension of a mobile sales force. From the point of view of a

corporate entity, the impact of mobile identity can be evaluated along three major areas:

increasing operational efficiencies without compromising security; increasing the degree

of personalization of services as well as active consumer management; and, finally,

increasing the speed of deployment of novel services and subsequently, increasing

revenue streams. Furthermore, mobile identity services reduce access management

infrastructure costs, improve process efficiencies, free critical human resources and

eliminate duplication of tasks. Also, mobile identity management facilitates tighter

relationships between trading peers including and employees, through accurate prediction

and delivery of appropriate content at the time of engagement. Finally, mobile identity

management allows for the rapid re-deployment of human resources to support novel

15

services to meet shifting market needs. Mobile identity management supplies the

infrastructure required to contain and control costs while expanding channels of business,

regardless of the location of end user.

Identity Service Provision. This discussion leads naturally to the observation that a new

entity, the mobile identity service provider (MIDSP), acquires a central role in the mobile

commerce value chain. First generation manifestations of the MIDSP are observed today

and it is expected that its role will become central with the development of next

generation networks (cf. section four). Although the role of the MIDSP as a mediator of

consumer transactions and the guard of personal information is significant, one of its

more important assets is the ability to direct the attention span of the consumer towards

particular choices which implies that it can exploit its advantage to developing market

segments through access control to end users [37]. From the point of view of the supplier,

the mediation of the consumer relationship by the MIDSP may also have essential utility

for its participation in dynamically created and adaptable value networks in real time. It

appears that, mobile identity management infrastructures seem to offer an opportunity for

unprecedented flexibility in real-time reconfiguration of value streams.

The MIDSP may also assist mobile business in mitigating liability arising from

regulations that protect consumer privacy and govern the sharing of personal information

without consumer consent. The proliferation of Internet and mobile business has

multiplied the number of access points to confidential information. Without an

appropriate security policy and superior security controls, the possibilities for data

16

compromise are greatly increased, hence the need for more flexible standardized and

context-based forms of managing identity that are device and application agnostic.

Through specialisation, MIDSPs can support a wider range of information technologies

and devices with mission-critical levels of scalability and reliability.

The strength of the MIDSP concept is that it exploits the property that mobile identity

management is most valuable when individual identity providers federate their resources

to provide identity services with wider scope. Such services can quickly mature from the

initial risk management and analysis stage to advanced collaborative service provision. In

the simplest case, mobile identity management infrastructure provides the foundation for

the engineering of business processes. Provisions for the evaluation and subsequent

mitigation of business risks associated with the introduction of this approach will also

accompany this stage. On the other hand, if organisations initiate the delivery of services

based on their own infrastructure they are restricted by the non-availability of identity

credentials from other organisations. Although the organisation has the capability to

support development of new services and enhance existing ones with the incorporation of

functionality of secure role-based access control and trust management, the usefulness of

this approach is restricted by the closed nature of the system. MIDSP mediation allows

for the extension of internal infrastructures via federated identity services. This

alternative allows the organisation to expand its operational limits and its collaborations

with its business peers, as well as the market segment that can be approached via trusted

(potentially global) mobile identity infrastructure while at the same time achieving

advanced interoperability.

17

Before concluding this section it is appropriate that we discuss the technologies used for

the implementation of first generation identity services. Although the technologies

discussed here have their roots in traditional identification system they are deemed here

to be identity rather than identification based either because they already incorporate truly

identity technologies or because they are committed to a roadmap that realises this

transition. Identity technologies can be classified in two main categories: Network or

device based though some more recent approaches combine both. This distinction

highlights the primary location where identity data are stored. Network based mobile

identity management systems are by far the most prevalent form of system and have been

developed primarily as a response to the lack of trust by consumers in electronic

commerce. Examples of network based mobile identity management systems are the

SourceID open source specification and systems, AOL Screenname, Liberty Alliance,

Microsoft Passport, Genio and Oblix. From a technological point of view, they inherit

their legacy from single sign-on, public key infrastructure and Internet directory systems

and they are characterised by the use of public networks and the safeguarding of identity

credentials at web-enabled servers. The current trend is for such systems to incorporate

trust management and access control mechanisms for Web Services primarily as part of

industry voluntary standards (for example the Liberty Alliance consortium works closely

with the Organisation for the advancement of Structured Information Standards OASIS).

18

However, no single approach has achieved market domination1 and none is expected to

achieve this in the foreseeable future.

Device based mobile identity systems offer a decentralised alternative to the management

of credentials, since more often than not the data is stored locally on a mobile device

carried by the user. In fact, the users themselves have the responsibility to authorise

access to their own data as well as maintain, protect and update them. Although this

would seem to imply a significant overhead for all parties involved the advantage for

users is that his data are stored under their control. The issue of trust is a recurring theme

in this paper and, if not resolved, can potentially represent a significant barrier for their

wider adoption by consumers. Devices that have been used for this purpose include

mobile telephones (for example via the inclusion of ECML e-wallet capabilities by

several handset manufacturers) and smart cards (primarily in the healthcare sector but

also Visa’s 3D Secure system). Finally, an emerging form of mobile identification is the

development of devices embedded in the human body (for example radio frequency

identification RFID transponders) that store the identity information and interact

wirelessly with the information infrastructure.

4. Identity in Next Generation Mobile Systems

The Internet, telephony and the consumer electronics market are rapidly converging

towards a novel global information architecture, driven by increasing demand for data

centred applications and mobility [30]. Depending on the point of view taken, the

1 Microsoft’s Passport available primarily via the Hotmail messaging service has approximately 200 million subscribers at the time of writing and AOL’s Magic Carpet which uses Liberty Alliance compatible systems from Sun Microsystems has approximately 150

19

emerging architecture is referred to either as ubiquitous or pervasive computing or as

fourth generation (4G) mobile telecommunication networks or in some cases simply as

next generation Internet (NGI) [19]. Whatever name is selected, it refers to a pervasive

fabric of intelligent instruments, appliances, information sources and information analysis

tools all tied together by high-speed wired and wireless networks which may include

personal software service agents that remove the burden of constantly searching for,

gathering, and analysing information in a data rich environment. However, the roadmap

to convergence is not perfectly clear. Indeed, there are considerable technical as well as

cultural differences between Internet, telephony and consumer electronic engineering as

well as business practice. On the one hand, the Internet has been built on top of

physically and administratively distributed, open systems while telephony and consumer

electronics are leveraging the advantages of centralised and proprietary systems and

protocols, systems that are closed to third parties. These differences create friction

between the three approaches but at the same time open up significant opportunities.

In the emerging fourth generation systems the network core is based on Internet

technologies extended via application layer routing, that is routers more aware of the data

content being transported [2]. Building on the application layer routing capability, at the

edges of the core network the main architectural element will be the overlay network.

Overlays have the advantage of producing on the fly systems of systems thus connecting

application services to processing capability embedded in the network fabric [21]. At the

user end, service delivery will be available over radically different access networks

(including PSTN, wired and wireless LAN, personal area networks including Bluetooth,

million subscribers.

20

second and third generation cellular, DSL, cable, satellite) as well as a variety of post-PC

user devices (including converged mobile telephone-portable computer and information

appliances). Another source of heterogeneity will be due to all sorts of new sensors that

will be attached to the network providing access to physical space data [34]. Indeed

heterogeneity is one of the main characteristics of fourth generation networks and extends

from the physical up to the service layer. Heterogeneity is abstracted in the software

infrastructure thus making possible for services to be deployed and redeployed rapidly

and even on demand. In fact, one of the most apparent implications of the new systems is

their capability to support new types of service architectures [31].

Next generation mobile devices are fundamentally different from today’s mobile

telephones being primarily a core connectivity device which, to a great extend, derives its

functionality from embedded networked components that it can discover: first in its

immediate locality, then within its accessible environment and finally over wide area

networks [58]. Discovery and adaptation to the available computational resources and

services requires mechanisms that are now being developed and are extending service

provision architectures from the Internet era (for example IETF Service Location

Protocol [55] and Salutation [32]). Fourth generation service discovery and configuration

frameworks are designed to support vertical and horizontal service aggregation,

interoperability bridges for access to networked data sources (for example, personalised

recommendations on the Grid via OGSA web services [48]), vocabularies for machine-

to-machine interactions as well as adaptability, that is the ability to acquire the required

functionality to perform specific tasks [45]. Built on top of the primary service discovery

21

mechanisms, a basic set of fundamental services is needed. Mobile identity together with

domain specific ontologies, semantic querying, environmental monitoring, reactive event

notification and distributed modelling services have been repeatedly identified as good

candidates for the core set of services [34, 38, 58]. Adaptability to discovered resources

and services would be accompanied by adaptability of the run-time behaviour of

applications as well as to active context delivered following the informational context of

the user situation. In addition to time and locality [25], context-awareness requires

tracking of different roles in different contexts to provide personalised and up-to-date

content.

The emerging architecture of fourth generation networks is already visible in several

cases [1, 6, 9, 10, 12, 21, 38, 39] but one of the most interesting questions is how should

this new infrastructure be used for conducting business. Some generic considerations of

the implications of such technologies for commerce are discussed in [10] but here we will

focus on the particular case of ubiquitous retail. Ubiquitous computing technologies were

first introduced in retail by IBM [6, 18, 24] and the concept was further developed by

project Albatros [47] though little attention had been paid to business issues, with the

focus solely on technology. Here we will discuss lessons learnt during our involvement in

the development and deployment of an experimental ubiquitous retail system which was

founded on a business rationale and evaluated at field trials in a realistic application

environment. A full technical description of the system is outside of the scope of this

paper and the interested reader should consult [39] for details. In brief this system is

perceived to extend or complement the reach of the retail supply chain in two ways: first

22

to include the consumer home through ambient intelligence devices and to provide a

richer shopping experience within the supermarket space [1, 9, 12, 37]. The business

rationale for the deployment of this system was founded on the capture of rich, real time

information regarding consumption and this information being fed back to the supply

chain in a collaborative manner between trading partners. This design offers more

accurate predictions of demand and the opportunity to optimise just-in-time

manufacturing in particular for the fast moving consumer goods (FMCG) sector.

Deployment of the system in realistic conditions raised significant concerns by

consumers. In particular, most concerns were related to acceptance of the system for

personal use. In the following paragraphs, we will discuss some of the findings of a

research study conducted during the requirements capture phase and we will point to the

criticality of mobile identity management as a component of the system (a detailed

description of this study has been published in [38]). The aim of the study was to assess

the appeal of ubiquitous commerce as a value proposition to the consumer as well as to

identify barriers to acceptance. The approach adopted was qualitative in nature and used

focus groups. Market Analysis a market research firm, was commissioned to conduct the

field research. The target audience consisted of: women between the age of 25-34,

responsible for grocery shopping within their household who demonstrated some

familiarity with information and communication technologies, either as regular users of

PC and mobile telephony at home or at work; women with the same background but from

the 35-50 age range; married couples with both partners between the ages of 25 and 34,

both responsible for shopping and with similar background as groups one and two; and,

23

couples as in the previous group but from the 35-50 age range. During the discussion the

participants were first introduced to ubiquitous retail concepts through a presentation

based on concept drawings with explanatory text, which the moderator used to discuss

selected usage scenarios. Following the introduction, participants were encouraged to

discuss their thoughts, feelings and reactions to this novel approach to retail as well as to

express their response regarding attitudes and purchase behaviour in this environment.

The discussions of all groups were recorded in audio and video with the permission of the

participants. At the end of the discussions participants were given a voucher for one of

the retailers participating in the project. In section five, the findings reported in the

following paragraphs will be reframed and described in terms of the three principles that

compose the enacted view on identity management.

The analysis of the findings highlighted one of the main concerns of the participants to be

the use of personalized purchase statistics by the retailer and collaborating service

providers. A large number of participants were particularly concerned about the

collection and storage of personal data, even though they were aware of the provisions

(albeit not the practicalities) of the data protection act. Their negative reaction to data

collection was triggered primarily after the eponymous authentication during the initial

use of the shopping cart when, after entering personal identification credentials, they

were presented with a personalized shopping list derived through the analysis of their

purchase history. The two main issues arising related to the immediate recognition of the

fact that for the construction of the personalised shopping list their data is recorder,

preserved and processed. This reaction was more pronounced when trust of third parties

24

was also involved –a core property of fourth generation systems. The main source of

concern was that private data, collected in the sheltered space of the home could be

delivered to external sources without the explicit consent of the consumer. The vast

majority of participants did not trust a service provider to protect their privacy,

irrespective of whether it was a contractual obligation or not.

Another major concern related to the overall shopping experience, which was perceived

to point towards a technology controlled, fully standardized life-style. Two issues

interrelate on this point: On the one hand, participants rejected the claim that a software

system could predict accurately their wishes just by collecting historical data and

monitoring habitual purchases. Indeed, due to its ability to pre-empt their wishes, this

aspect of the system appeared patronizing and overtly rationalized but most importantly

contrary to the experience of being human. In fact, the majority of participants discarded

the possibility of a computer system that could successfully predict their wishes, while

some of them were offended by this suggestion. On the other hand, the participants of the

study perceived that the ubiquitous retail system reviewed promoted primarily the

interests of the supplier while the consumer only received marginal benefits.

Finally, several participants observed that adoption of ubiquitous retail would result in a

fundamental transformation of the traditional family roles. They emphasised that product

selection and maintenance of appropriate home inventory levels are a means to establish

roles within the family unit and the responsibility to carry out these activities an integral

part of the identity of the person or persons in charge. Elimination of this responsibility

25

was perceived to undermine the status quo and ubiquitous retail was consequently treated

with mistrust and hostility.

5. The Enacted View of Mobile Identity

There are different ways of conceptualising mobile business, and hence different ways of

understanding what is needed for its success. One perspective is the 'objective' view in

which technologies are seen as singular entities with specific powers and consequences.

Thus, in the vein of technological determinism, these powers and consequences are

regarded as predictable. And in the vein of strategic choice, success is seen as depending

on decisions made by management in selecting and deploying technologies. As argued by

[31] however, it is crucial also to recognize the 'enacted' view of technologies. According

to this view, the digital economy is an open-ended socio-technical production: a mass of

particular actions taken as individuals and groups make their own uses of technologies.

The result may be dynamic, unpredictable and strongly mediated by the idiosyncrasies,

needs, and preferences of individuals and groups. The enacted view argues that if we

ignore individual human agency in the actual and day-to-day use of technologies then we

achieve an artificial and unhelpful understanding of their success [31]. Hence, we need to

attend to 'technologies-in-use' that is, the actual results of introducing technologies into

particular situations, contexts, tasks and communities, rather than just to 'espoused

technologies' that is general expectations about the functions of systems.

The use of mobile business technology, then, is situated, and a crucial dimension of this

situatedness is identity. We exploit mobile communications, the Internet and consumer

26

electronics technologies not in a vacuum but within human relationships, and these

relationships are, in turn, mediated by issues of identity. Thus we find issues of trust,

rights, duties, expectations, privacy and so on as central to the use of technology, not

simply as subsidiary or occasional 'human factors'. Our concern is that identity is intrinsic

to mobile business, and if not addressed appropriately may slow mobile business growth.

We therefore need a general framework for understanding identity in the context of

mobile business which brings existing resources and new developments together. In the

humanities, the study of identity and related issues goes back at least to the thinkers of

ancient Greece: Aristotle and the ancient Stoic thinkers, for example, discussed the

competing demands of individuality and community, and the many forces which bear on

a person's sense of self [15]. This has been a long debate with many differences in point

of view. However, three points stand out as issues which cannot be ignored in adequate

treatments of identity.

• The locality principle says that identities are situated in particular contexts,

relationships, roles and communities, and that we may have different or

overlapping identities attaching to different contexts.

• The reciprocity principle says that both sides in a relationship need to know what

is going on so that they can check and correct each other’s perceptions.

• The principle of understanding says that identity serves in two-way relationships

as a basis for mutual understanding.

27

The locality principle has been identified in various treatments of the self [14, 46], and

has significant implications for mobile business. It implies, for example, that a global or

universal identity makes little sense. We cannot expect consumers of mobile services to

be comfortable with a single identity profile in relation to a universe of activities and

services that entail all aspects of their life. Rather, we can expect a strong preference to

maintain different identities attaching to different functions, roles and communities, and

to have control over these. This would explain the overall negative reaction of the

participants of the focus groups to ubiquitous retail since users of the system were

characterised singularly as consumers. We believe that since the system extends to all

types of activities including professional and family, refusing to acknowledge the

different identities, the system did not address locality concerns. For this reason it was

perceived as being designed to benefit the business only without taking into account the

users needs. The locality principle also highlights the need to balance two forces in

ubiquitous retail or any other mobile business: first, the need to respect the consumer’s

localized and multiple identities, and second, the significant advantages of open,

collaborative and ubiquitous mobile business. Although it may be convenient to share

consumer data with trading partners this action is liable to destroy trust. It is not that the

details in question involve anything profoundly secret or private to the consumer, but

rather that the localized identity developed via significant personal investment is

forcefully removed by an external entity and used beyond the locality that has been

developed.

28

The reciprocity principle concerns the negotiation and knowledge of identity in human

relationships [49]. In mobile business this principle bears primarily on issues of privacy,

profiling and surveillance, and implies that collecting identity data by tracking the

activities of individuals will be unacceptable if it is not reciprocal. Not knowing who is

the peer collecting the data, how the data will be used, how to correct errors in the data

and whether to expect a return describes the relationship as non-reciprocal and introduces

asymmetry. Part of the relationship formed is invisible to us and, thus, we cannot

influence the identity which we have to the other party. This is certainly true also for

most electronic commerce technologies currently in use including mobile business but, as

technology becomes more pervasive and ambient, this type of informational asymmetry

will increase. Mobile business service providers should consider that respecting

reciprocity often involves a trade-off: a consumer may find profiling useful since it

allows a personalised service to be offered but, on the other hand, it may be

uncomfortable if the relationship is asymmetrical with regard to control and access to

information. At the very least, the consumer should be remunerated for the informational

asymmetry either directly or indirectly in a fair and acceptable to both parties way. There

is already some work underway in valuation of privacy [22] but we advocate that the

asset to be valued should be identity instead. In the case of the ubiquitous retail system

examined here, consumers were not offered a comprehensive means to either review or

modify information collected about them neither were they offered the opportunity to

directly benefit from the use of their personal information. In fact, the perceived benefit

was some degree of automation in the replenishment task of home supplies but on

balance this was not seen as a fair trade-off for the information they gave up. This

29

observation justifies the reluctance of the focus groups participants to accept the use of

personal information by the system.

The principle of understanding concerns the role of identity in the mutual comprehension

which supports relationships [5, 11]. In mobile business, this principle implies that

consumers need to understand the service provider and vice versa. Thus, although

technologies may lower the barrier of entry to the mobile marketplace consumers prefer

to engage in business activities with parties for whom they have access to a

comprehensible company identity. Indeed, the experience in consumer-to-consumer

commerce has already shown that perception of identity of the seller affects directly the

perceived risk of the transaction, the willingness of the buyer to transact with the

particular seller and last but not the least the price paid. Such understanding frequently

involves what psychologists have called 'simulation': the ability to see things from the

point of view of another agent. If the materials for this understanding are not provided,

trust and consequently mobile business may suffer. Furthermore, the principle of

understanding affects the relationship in both directions. At the same time when the

consumer needs to understand the supplier that is engaged with in mobile commerce, the

business has also to understand and respect the identity of the consumer and modify its

practices accordingly. When this did not occur in the ubiquitous commerce scenario the

consequence was that it created a threat for the balance of family structure. Of course,

this resulted in creating a considerable barrier to adoption of the system.

30

These three principles provide a basic framework or conceptualisation for issues of

identity in mobile business. They derive from existing resources in the humanities, and

can be applied to contemporary conditions and refined through this process. Most cases,

of course, can be subtle and complex and two or more of the basic principles given here

would undoubtedly appear intertwined together in any situation: When does anonymised

data mining become individual profiling? Is it practicable to inform individuals when

their profile has been sold on and what is a fair use of identity information by the service

provider? How sharp a distinction exists between the data used in the identification of a

person, for example in authenticating a transaction, and that person's basic identity or

identities? With the proliferation of next generation mobile systems and ubiquitous

computing these questions will acquire greater urgency. In terms of identity, this

advanced form of mobility implies that old principles manifest in new contexts:

foundational issues of human relationships are reappearing in circumstances and

situations created by a fabric of ambient and pervasive information and communications

technologies. The clear implication for next generation mobile business, therefore, is that

we need to better understand this relationship, and the requirements due to identity placed

on the design and deployment of novel mobile business services.

6. Concluding Remarks

Mobile identity management systems are emerging as a response to the emerging crisis of

personal information management for consumers as well as the slower than expected

growth of electronic and mobile business due to the lacking development of trust

relationships between consumers and suppliers. Next generation converged public

31

communication networks will offer novel opportunities for business through the

provision of dynamic, re-configurable, federated constellations of services. In this

context, mobile identity management would become a core infrastructure component for

the deployment of next generation mobile business services. However, such services

affect humans in intimate ways by challenging their notions of identity and of self. It is,

thus, important that in order to be effective and acceptable the emerging service

architectures should accommodate these needs in a usable and inclusive approach.

Factors that are deemed as important to understand human identity and the construction

of the self include the competing demands of individuality and community membership,

privacy, trust, duties, rights and expectations. Mobile business forces these issues to

manifest themselves in new shapes and forms, and although a re-examination of these

factors and their relationships may be required, the issues themselves have not gone

away. We advocate that in designing novel mobile business systems that inevitably

incorporate mobile identity management as a core component, the enacted view is the

appropriate basis for analysis. Last but not least, we anticipate that the level of

involvement of human factors in discussing mobile identity management is crucial. We

expect that widening the discipline boundaries for future research on identity in mobile

business will be essential for the development of acceptable mobile service provision

systems.

32

References

1. Abowd, G.D.; Mynatt, E.D. and Rodden, T. The Human Experience, IEEE

Pervasive Computing, 1, 1 (January 2002), 48-57.

2. Asunmaa, P.; Inkinen, S.; Nykänen, P.; Päivärinta, S.; Sormunen, T. and Suoknuuti,

M. Introduction to Mobile Internet Technical Architecture, Wireless Personal

Communications, 22, 2 (August 2002), 253-259.

3. Bakos, Y The emerging landscape for internet e-commerce, Journal of Economic

Perspectives, 15, 1 (January 2001), 69-80.

4. Bellman, S.; Lohse, G. and Johnson, E. Predictors of online buying behavior.

Communications of the ACM, 42, 12 (Dec. 1999).

5. Boer S. and Lycan, W.G. Knowing Who, Bradford, 1986.

6. Burkhardt, J.; Henn, H.; Hepper, S.; Rindtorff, K. and Schaeck, T. Pervasive

Computing, Addison-Wesley, 2001

7. Cheskin Research eCommerce Trust Study, Research Report, 1999.

8. Clark, R. Human identification in information systems: management challenges and

public policy issues, Information Technology & People, 7, 4 (December 1994), 6-37.

9. Davies, N. and Gellersen, H.W. Beyond Prototypes: Challenges In Deploying

Ubiquitous Systems, IEEE Pervasive Computing, 1,1 (March 2002), 26-35.

10. Fano, A. and Gershman, A., The Future of Services in the Age of Ubiquitous

Computing, Communications of the ACM, 45, 12 (December 2002), 83-85.

11. Flanagan, O. Varieties of Moral Personality: Ethics and Psychological Realism,

Cambridge, MA: Harvard University Press, 1991.

33

12. Global Commerce Initiative The GCI Intelligent Tagging Model, An examination of

product and supply chain opportunities, Whitepaper, 2001.

13. Godwin J.U. Privacy and security concerns as major barriers for e-commerce: a

survey study, Information Management & Computer Security, 9, 4 (September

2001), 165-174.

14. Goffman, E. The Presentation of Self in Everyday Life, New York: Doubleday,

1956.

15. Guthrie, W.K.C. The Sophists, A History of Greek Philosophy, Vol 1, Cambridge

University Press, 1971.

16. Hagel III, J. and Rayport J. The new infomediaries, The McKinsey Quarterly, 4

(April 2000), 54-70.

17. Hoffman, D.L., Novak, T.P. and Peralta, M.A. Building consumer trust online,

Communications of the ACM, Volume 42, Number 4 (April 1999), 80-85.

18. IBM Corporation, Project Smart Pad.

19. IIR The Path to 4G, London, UK, 2002.

20. Jarvenpaa, S.; Tractinsky, N. and Vitale, M. Consumer trust in an Internet store.

Information Technology and Management, 1, 1(January 2000), 45–71.

21. Katz, R. The post PC era: It’s all about services, Networking 2002, Pisa, Italy

February 2002.

22. Kleinberg, J.; Papadimitriou, C.H and Raghavan, P. On the value of private

information, Eighth conference on Theoretical Aspects of Rationality and

Knowledge, July 2001.

34

23. Kraut, R.; Chan, A.; Butler, B. and Hong, A. Coordination and virtualisation: the

role of electronic networks and personal relationships, Journal of Computer

Mediated Communication, 3, 4 (September 1998).

24. Lawrence, G.S.; Almasi, V.; Kotlyar, M.S.; Viveros, S. and Duri, S. Personalization

of Supermarket Recommendations, Data Mining and Knowledge Discovery, 5,

(August 2001), 11-32.

25. Lucas, P. Mobile Devices and mobile data-issues of identity and reference, Human-

Computer Interaction, 16, 2 (April 2001), 323-336.

26. Mintel International Credit Cards, Research report, 2000.

27. May P. Mobile Commerce - Opportunities, Applications, and Technologies of

Wireless Business, Cambridge: Cambridge University Press, 2001.

28. Matejkovic, J. and Lahey, K.E Identity theft: no help for consumers, Financial

Services Review, 10 (July 2001), 221-235.

29. Muller-Veerse, F. Mobile commerce report, Durlacher Corporation, London, 1999.

30. National Research Council Looking Over the Fence at Networks: A Neighbor’s View

of Networking Research, National academies Press, 2002.

31. Orlikowski W. and Iacono, C.S. The truth is not out there: An enacted view of the

Digital Economy, In Brynjolfsson, E. and Khim, B. (eds.) Understanding the Digital

Economy: Data, Tools and Research, MIT Press, 2001.

32. Robert Pascoe Building Networks on the Fly, IEEE Spectrum, 38, 3 (March 2001),

61-65.

35

33. Pew Research Center Pew Internet and American Life Project Trust and Privacy

Online: Why Americans Want to Rewrite the Rules, August 20, 2000.

http://www.pewinternet.org/reports

34. Raman, B.; Agarwal, S.; Chen, Y.; Caesar, M.; Cui, W.; Johansson, P.; Lai, K.;

Lavian, T.; Machiraju, S.; Morley Mao, Z.; Porter, G.; Roscoe, T.; Seshadri, M.;

Shih, J.; Sklower, K.; Subramanian, L.; Suzuki, T.; Zhuang, S.; Joseph, A.D.; Katz,

R.H. and Stoica, I The SAHARA Model for Service Composition across Multiple

Providers In Mattern, F. and Naghshineh, M. (eds.): Pervasive Computing: First

International Conference, Lecture Notes in Computer Science, 2414 (August 2002),

1-14.

35. Rannenberg, K. Multilateral Security A Concept and Examples for Balanced

Security, ACM New Security Paradigms Workshop, (September 2000), 151-162.

36. Reichenbach M. Individual Risk Management - Defining User Requirements for

Secure and Efficient Electronic Payments, Proceedings of the Fourth International

Conference on Electronic Commerce Research, 2001.

37. Reid, R. and Brown, S. I hate shopping! An introspective perspective, International

Journal of Retail & Distribution Management, 24, 4, (June 1996), 4-16

38. Roussos, G.; Koukara, L.; Kourouthanasis, P.; Tuominen, J.; Seppala, O.; Giaglis,

G. and Jeroen F. A case study in pervasive retail, ACM MOBICOM Second

International Workshop in Mobile Commerce, (September 2002), 90-94.

39. Roussos, G.; Spinellis, D.; Kourouthanasis, P.; Gryazin, E.; Pryzbliski, M.;

Kalpogiannis, G. and Giaglis, G. Systems Architecture for Pervasive Retail, ACM

SAC E-Commerce, (March 2003), 350-356.

36

40. Sadeh N. M-Commerce - Technologies, Services, and Business Models, New York,

NY John Wiley, 2002.

41. Shapiro, Carl and Varian, Hal Information Rules: A strategic Guide to the New

Economy, Harvard Business School Press, 2000.

42. Sproull, L. and Kiesler, S. Reducing social context cues: Electronic mail in

organizational communication, Management Science, 32, 11, (November 1986),

1492- 1512.

43. Strader, T.J. and Ramaswami, S.N. The value of seller trustworthiness in C2C online

markets, 45, 12 (December 2002), 45-49.

44. Strader, T. and Shaw, M. Consumer cost differences for traditional and Internet

markets, Internet Research, 9, 2 (February 1999), 82–92.

45. Storey, M.; Blair, G. and Friday, A. MARE: Resource Discovery and Configuration

in Ad Hoc Networks, Mobile Networks and Applications, 7 (August 2002), 377–387.

46. Taylor, C. Sources of the Self: The Making of the Modern Identity, Cambridge, MA:

Harvard University Press, 1989.

47. Trigueros, C. ALBATROS: Electronic tagging solutions for the retail sector,

Informatica El Corte Inglés, Madrid, Spain, 1999.

48. Tuecke, S.; Czajkowski, K.; Foster, I.; Frey, J.; Graham, S.; Kesselman, C. and

Vanderbilt, P. Open Grid Service Infrastructure: Grid Service Specification, Global

Grid Forum, October 2002.

49. Tugendhat, E. Self-Consciousness and Self-Determination, Cambridge, MA: MIT

Press, 1986.

37

50. U.S. Federal Trade Commission Privacy Online: Fair Information Practices In The

Electronic Marketplace, 2000.

51. U.S. Federal Trade Commission Identity theft complaint data: Figures and Trends in

Identity Theft, 2001.

52. Varian, H.R. Price discrimination, In Schmalensee, R and Willig, R. Handbook of

Industrial Organisation, 1989, North-Holland Press, Amsterdam.

53. Varshney, U.; Vetter, R. and Kalakota, R. Mobile commerce: A new frontier, IEEE

Computer, 33, 10 (October 2000), 32-38.

54. Varshney, U. and Vetter, R. Mobile commerce: Framework, applications, and

networking support, ACM/Kluwer Journal Mobile Networks Applications, 7, 3 (June

2002), 185–193.

55. Veizades, J.; Guttman, E.; Perkins, C. and Kaplan S. RFC 2165: Service Location

Protocol, Internet Engineering Task Force, 1997.

56. Walther, J. and Burgoon, J.K. Relational communication in computer-mediated

interaction, Human Communication Research, 19, 1 (January 1998), 50-88.

57. Wiederhold, G. Mediators in the architecture of future information systems, IEEE

Computer, 18, (November 1992), 38-48.

58. Wireless World Research Forum Book of Visions, Whitepaper, Temple, Arizona,

2002.

38